McAfee announced an end-to-end solution to help organizations combat the increasing challenges of advanced malware.

McAfee goes beyond single-feature, static analysis sandboxing products to address all three key requirements needed to counter today’s stealthy threats: the ability to find advanced malware with the new McAfee Advanced Threat Defense appliance, the ability to freeze the threats with McAfee network solutions, and the ability to initiate a fix with McAfee Real Time.

Enterprises are struggling to meet the threat defense challenges facing them today. Malware is now more sophisticated and stealthy. Many organizations are relying on their legacy security products and waiting for additional advanced malware protections to be incorporated, thereby exposing their organization to malware threats. Or they are using standalone malware products and plugging in third party products that are not integrated with the rest of the environment.

While this may be expedient it is not a good strategy and can end up costing more money in the long run. Dealing with multiple contracts, multiple deployments, support headaches, development tasks, or paying a premium for connectors to enable the integration are just a few of the issues for organizations.

Advanced malware is a difficult problem facing organizations of all sizes,” said Pat Calhoun, general manager of network security at McAfee. “Detecting malware is only one piece of the whole solution. You also have to stop it from further infecting the network and remediate any infections. Difficult problems don’t require difficult solutions. McAfee combines superior threat detection with network and endpoint protection resulting in lower total cost of ownership for businesses.”

Spotlight

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Learn about personal data bankruptcy and the cost of privacy, security and compliance, delivering digital security to a mobile world, and much more.

As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the best way to defend our networks and our customers against an attack?”

The code redirects visitors to another URL where the Fiesta exploit kit is hosted, which then tries to detect and exploit several vulnerabilities in various software. If it succeeds, the visitors are saddled with a banking Trojan.

Looking for an Android-based tablet for your child but don't know which one to choose? If you are concerned about the device's protection against random hackers, Bluebox Security has just released a review of the nine most popular Android tablet models aimed specifically at children.